ad-alston / aefsView external linksLinks
A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission of data.
☆14May 18, 2017Updated 8 years ago
Alternatives and similar repositories for aefs
Users that are interested in aefs are comparing it to the libraries listed below
Sorting:
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- ☆56Apr 4, 2022Updated 3 years ago
- ☆11May 29, 2024Updated last year
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Apr 13, 2023Updated 2 years ago
- FAME CP-ABE Encryption based on JPBC☆28Jan 16, 2020Updated 6 years ago
- 基于访问树构造的属性基加密☆65Jul 26, 2022Updated 3 years ago
- Attribute-based Encryption☆28Jun 30, 2023Updated 2 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆191Mar 29, 2021Updated 4 years ago
- Attribute-based Encryption☆206Jul 31, 2020Updated 5 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆37Jan 12, 2019Updated 7 years ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆11Apr 1, 2023Updated 2 years ago
- egg graphql plugin☆10Apr 12, 2022Updated 3 years ago
- ☆10Aug 14, 2019Updated 6 years ago
- A Hyperledger Fabric Based Access Control system to mediate access control flow from centralized applications.☆47Apr 13, 2022Updated 3 years ago
- w8ay专属扫描器☆11Feb 9, 2017Updated 9 years ago
- 漏洞盒子入驻企业列表爬虫☆14Jan 18, 2019Updated 7 years ago
- Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction☆10May 10, 2021Updated 4 years ago
- Implementation of backpropagation algorithm in MATLAB to detect DDOS (Distributed Denial Of Service) Attack in NDN(Named Data Networking)…☆14Mar 8, 2017Updated 8 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 10 years ago
- pairing based cryptography☆16Sep 17, 2018Updated 7 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- ☆11Feb 13, 2020Updated 6 years ago
- Digital identity management frame based blockchain's smart contracts of zero knowledge proof☆10Oct 9, 2021Updated 4 years ago
- 0xcert documentation☆15Dec 2, 2023Updated 2 years ago
- Protect Java Code from Decompilation, beyond Obfuscation☆13Nov 23, 2020Updated 5 years ago
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆13Sep 20, 2023Updated 2 years ago
- ☆15Nov 24, 2023Updated 2 years ago
- Detecting software vulnerability described public security reports with minimal training examples☆14Jun 11, 2021Updated 4 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- OPHELib is an optimized library for partially homomorphic encryption. It currently provides an implementation of the Paillier encryption …☆15May 29, 2019Updated 6 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Dec 10, 2020Updated 5 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Droplet: Decentralized Authorization for IoT Data Streams☆15May 22, 2023Updated 2 years ago
- This lab provides samples for multi channel network using Hyperledger Fabric.☆10Dec 20, 2018Updated 7 years ago
- Attribute-based Access Control over Named Data Networking☆17Jul 18, 2025Updated 6 months ago
- Zero-knowledge Range Proof☆16Nov 16, 2017Updated 8 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆56Apr 9, 2020Updated 5 years ago